Excedeo Blog

Excedeo has been serving the San Diego area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Poking at Spear Phishing

Poking at Spear Phishing

Hopefully, you’ve heard of phishing at this point: the method cybercriminals use to scam their targets by impersonating someone that their targets would trust, requesting access credentials or other sensitive information. Did you know that there are specific kinds of phishing? Here, we’ll review one of the biggest risks to your business... spear phishing.

Continue reading
0 Comments

Can You Recognize the Risks that Appear in Your Email?

Can You Recognize the Risks that Appear in Your Email?

Email is often touted as a favorite medium for launching cyberattacks against businesses and individuals. This is because it’s easy to hide the true intent behind an email attack within its contents, whether they are embedded images in the message itself, or links to external sources. How can you know for sure whether the links in your email inbox are legitimate?

Continue reading
0 Comments

Can You Spot the Bait in a Phishing Attack?

Can You Spot the Bait in a Phishing Attack?

Hackers are always trying to find creative and new ways to steal data and information from businesses. While spam (unwanted messages in your email inbox) has been around for a very long time, phishing emails have risen in popularity because they are more effective at achieving the desired endgame. How can you make sure that phishing scams don’t harm your business in the future?

Continue reading
0 Comments

It’s Decided: You’re More Likely to be Phished than Breached

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces the groundbreaking thought that phishing attacks should be at the forefront of a business owner’s mind regarding network security.

Continue reading
0 Comments

Is It A Good Idea To Bait A Phishing Scam?

Is It A Good Idea To Bait A Phishing Scam?

Phishing scams have had a supporting role in many of the latest cyber threats, often as the means the attacker has used to start off their attack. This attack vector is relatively easy to avoid in most cases, but requires education for the end user.

Continue reading
0 Comments

Social Media: The Most Effective Tool for Phishing Scams

Social Media: The Most Effective Tool for Phishing Scams

One thing that both fishing and phishing have in common is the use of lures. With the right lure, the chance of successfully catching the target improves. When it comes to the digital lures seen in phishing scams, research shows that social media is the most effective.

Continue reading
0 Comments

How a Phishing Scam Works and What You Can Do to Protect Yourself

b2ap3_thumbnail_social_engineering_magnet_400.jpgMost hacking attacks are the result of a flaw or vulnerability found within the code of a program or operating system, but we rarely take into account the ones that don’t. Hackers often take advantage of the human side of hacking as well, a process known as “social engineering.” This is usually the act of conning users into handing over personal information of their own free will, and it’s surprisingly effective.

Continue reading
0 Comments

Contact Excedeo Today

619.398.4100

Mobile? Grab this Article!

Qr Code

Tag Cloud

SecurityTip of the WeekTechnologyBest PracticesPrivacyInternetCloudMicrosoftBusiness ComputingHackersSoftwareEfficiencyGoogleBusiness ManagementInnovationProductivityHosted SolutionsBackupUser TipsWorkplace TipsManaged Service ProviderMalwareBusinessMobile DevicesNetwork SecurityHardwareIT ServicesProductivitywindowsComputerUpgradeEmailDataCommunicationIT SupportMiscellaneousSaving MoneyGadgetsSmartphonesVirtualizationAppsWindows 10SmartphoneSmall BusinessNetworkDisaster RecoveryBusiness ContinuityServerBrowserVoIPMobile Device ManagementMicrosoft OfficeMobile ComputingAndroidSocial MediaHealthTech TermInformation TechnologyQuick TipsPasswordsCybersecurityData BackupOffice 365HolidayMobile OfficeOperating SystemGoing GreenWindows 10Data RecoverySave MoneycommunicationsOfficeChromespamAlertBest PracticeOutsourced ITCollaborationCybercrimeUsersApplicationInternet of ThingsEmployer-Employee RelationshipBYODAppMarketingSearchData SecurityLaw EnforcementRansomwareManaged IT ServicesIT SupportTabletWearable TechnologyRemote ComputingPhishingWirelessAppleVendor ManagementWiFiBring Your Own DeviceThe Internet of ThingsFacebookiPhoneUser ErrorRemote MonitoringUnified Threat ManagementRisk ManagementAntivirusCost ManagementAvoiding DowntimeHackingMaintenanceSaving TimeMobilityHistoryRouterWireless TechnologyBDRMoneyAutomationHard DrivesBandwidthOffice TipsPasswordArtificial IntelligenceComputersData ManagementSocialIT SolutionsTelephone SystemsCustomer Relationship ManagementTech SupportBig DataEncryptionOneNoteCloud ComputingGovernmentFirewallVulnerabilityTwo-factor AuthenticationUpdateLithium-ion batteryCurrent EventsGoogle DriveSocial NetworkingVPNShortcutHumorWebsiteNet NeutralityEducationNetworkingPrinterOutlookManaged IT ServicesGmailInformationUSBUnsupported SoftwareBudgetPowerPointPhone SystemAnalyticsWi-FiProactive ITMobile DevicePoliticsTrendingAuditIT COnsultantIntranetAugmented RealityComputer RepairLaptopExcelContent FilteringMeetingsTravelApplicationsManaged ITTelephonyVirusBatteryTelevisionadministrationPersonal InformationRetailPaperless OfficeSocial EngineeringBlockchainIdentity TheftDisasterEntertainmentWordWork/Life BalanceRecoveryManaged ServiceStreaming MediaFlexibilityPatch ManagementHaaSOnline CurrencyManaging StressFraudStorageData StorageScamGoogle DocsBusiness TechnologyPoint of SaleWireless ChargingYoutubePrinter ServerHosted SolutionWannaCryMobile SecurityBusiness IntelligenceFile SharingTouchscreenData BreachCustomer ServiceTwitterProject ManagementProgrammingSamsungBiometricsCortanaSalesHard DriveHybrid CloudUninterrupted Power SupplyEvernoteVirtual RealityPrivate CloudDisplayAmazonAutomobileHIPAACleaningOneDriveInternet ExlporerHuman ResourcesDDoSFax ServerInstant MessagingSave TimeEmailsComputingPrintingComputer CareData ProtectionWindows 8hackerSportsBenefitsGoogle AssistantConferencingIT ManagementeWasteComputer AccessoriesLegalDevicesValueTransportationSaaSAccess ControlCommerceEnd of SupportManagementWIndows 7LifestyleCredit CardsAdminSpywareRobotVendorNetwork CongestionAccessory5GWebsitesRegulationsData LossAdvertisingBluetoothWireless InternetFAQScalabilityKeyboard ShortcutsExperiencejunkSyncData storageEmployee-Employer RelationshipiOSPeripheralEmployeesData TheftCamerasPDFSharePointCommunityGamificationUpgradesUserChargerHow ToPayrollEdgeMusicfilterISPComputer FanScreen MirroringVirtual DesktopVoice over Internet ProtocolApp storeEmployer Employee RelationshipPresentationNokiaMicrosoft ExcelText MessagingIntrantetTeamworkMemoryConsultantBest AvailableGift GivingScienceTutorialSecurity CamerasCiminalBooksAdobeTouchpadBloggingTestingCastSabotageMicrobloggingFinancialBlack MarketMachine LearningElectronic Medical RecordsCameraMonitorsBuisnessPCIdentityRunning CableCo-managed ITWebinarNanotechnologyDowntimeIT budgetSafetyLicensingOperating SysytemProjectsSmartwatchData PrivacyTrainingNear Field CommunicationLegislationWebinarImagesVirtual AssistantIT solutionsWorkersRoot Cause AnalysisPrint ServerE-CommerceTabletsWindows 7Server MaintenanceChromebookCompany CultureIT consultingComparisonHBOAlexa for BusinessWindows 10sUpdatesCo-Managed ServicesPayment CardsIdentitiesNFLReputationEbayInvestmentReliable ComputingSpecificationsMicrosoft WordWorker CommuteComplianceDebateAdministratorHelp DeskDistributed Denial of ServiceSolid State DriveTelephoneSettingsBloatwareEmployeeLanguageKeyboardROIVideo GamesDevice SecurityInbound MarketingAccessSoftware as a ServiceHard Disk DriveHyperlinkBreak/FixHiring/FiringWindows InkFiles3D PrintingBrandingComputer ForensicsGiftsWIndows Server 2008MouseSurge ProtectorWasting TimeMedical ITProactiveSmart TechnologyGoogle MapsChromecast